Vulnerability Description
When generating an ICMP Destination Unreachable or Packet Too Big response, the handler copies a portion of the original packet into the ICMP error body using the IP header's self-declared total length (ip_tot_len for IPv4, ip6_plen for IPv6) without validating it against the actual packet buffer size. A VM can send a short packet with an inflated IP length field that triggers an ICMP error (e.g., by hitting a reject ACL), causing ovn-controller to read heap memory beyond the valid packet data and include it in the ICMP response sent back to the VM.
CVSS Score
MEDIUM
Related Weaknesses (CWE)
References
- https://access.redhat.com/errata/RHSA-2026:11694
- https://access.redhat.com/errata/RHSA-2026:11695
- https://access.redhat.com/errata/RHSA-2026:11696
- https://access.redhat.com/errata/RHSA-2026:11698
- https://access.redhat.com/errata/RHSA-2026:11700
- https://access.redhat.com/errata/RHSA-2026:11701
- https://access.redhat.com/errata/RHSA-2026:11702
- https://access.redhat.com/security/cve/CVE-2026-5265
- https://bugzilla.redhat.com/show_bug.cgi?id=2453458
- http://www.openwall.com/lists/oss-security/2026/04/20/2
- http://www.openwall.com/lists/oss-security/2026/04/20/4
FAQ
What is CVE-2026-5265?
CVE-2026-5265 is a vulnerability with a CVSS score of 6.5 (MEDIUM). When generating an ICMP Destination Unreachable or Packet Too Big response, the handler copies a portion of the original packet into the ICMP error body using the IP header's self-declared total lengt...
How severe is CVE-2026-5265?
CVE-2026-5265 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-5265?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.